An SMTP session may not include _______
1.zero SMTP transaction
2. one SMTP transaction
3.more than one SMTP transaction
4.one HTTP transaction
Choose the statement which is wrong incase of SMTP?
1. It requires message to be in 7bit ASCII format
2.It is a pull protocol
3. It transfers files from one mail server to another mail server
4. SMTP is responsible for the transmission of the mail through the internet
DHCP (dynamic host configuration protocol) provides __________ to the client.
1. IP address
2.MAC address
3.Url
4.none of the mentioned
In SMTP, the command to write receiver’s mail address is written with the command ____
1.SEND TO
2.RCPT TO
3.MAIL TO
4.RCVR TO
Internet mail places each object in ______
1.Separate messages for each object
2.One message
3.Varies with number of objects
4.Multiple messages for each object
SMTP connections secured by SSL are known as ________
1. SMTPS
2.SSMTP
3. SNMP
4. STARTTLS
SMTP defines _______
1.message transport
2. message encryption
3.message content
4.message password
The domain name system is maintained by _______
1.distributed database system
2. a single server
3.a single computer
4.none of the mentioned
The right to use a domain name is delegated by domain name registers which are accredited by ______
1. internet architecture board
2. internet society
3. internet research task force
4. internet corporation for assigned names and numbers
The underlying Transport layer protocol used by SMTP is _____
1. TCP
2.UDP
3. Either TCP or UDP
4.IMAP
A DNS client is called ____
1. DNS updater
2.DNS resolver
3.DNS handler
4.none of the mentioned
A session may include ______
1. Zero or more SMTP transactions
2.Exactly one SMTP transactions
3.Always more than one SMTP transactions
4.Number of SMTP transactions cant be determined
An email client needs to know the _________ of its initial SMTP server.
1.IP address
2.MAC address
3.URL
4.Name
DHCP is used for ______
1.IPv6
2. IPv4
3. Both IPv6 and IPv4
4.none of the mentioned
DHCP uses UDP port _________ for sending data to the server.
1. 66
2. 67
3.68
4.69
DNS database contains _______
1.name server records
2. hostname-to-address records
3.hostname aliases
4.all of the mentioned
Expansion of SMTP is ________
1.Simple Mail Transfer Protocol
2. Simple Message Transfer Protocol
3.Simple Mail Transmission Protocol
4.Simple Message Transmission Protocol
Find the FTP reply whose message is wrongly matched.
1. 331 – Username OK, password required
2.425 – Can’t open data connection
3.452 – Error writing file
4.452 – Can’t open data connection
If a server has no clue about where to find the address for a hostname then _______
1.server asks to the root server
2.server asks to its adjcent server
3. request is not processed
4. None of the mentioned
If you have to send multimedia data over SMTP it has to be encoded into _______
1. Binary
2. Signal
3.ASCII
4.Hash
IP assigned for a client by DHCP server is
1.for a limited period
2.for an unlimited period
3.not time dependent
4. None of the mentioned
SCP protocol is evolved from __________ over SSH.
1.RCP protocol
2.DHCP protocol
3.MGCP protocol
4.GCP protocol
Secure shell (SSH) network protocol is used for _____
1.secure data communication
2.remote command-line login
3. remote command execution
4.all of the mentioned
Servers handle requests for other domains _______
1. directly
2. by contacting remote DNS server
3. by contacting remote DNS server
4.none of the mentioned
Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.
1.TCP
2.UDP
3. DCCP
4.SCTP
SMTP is not used to deliver messages to ______
1. user’s terminal
2.user’s mailbox
3.user’s word processor
4.user’s email client
SMTP uses which of the following TCP port?
1.22
2. 23
3.21
4.25
SSH can be used in only _________
1.unix-like operating systems
2.windows
3.both unix-like and windows systems
4.none of the mentioned
SSH uses ___________ to authenticate the remote computer.
1. public-key cryptography
2.private-key cryptography
3.any of public-key or private-key
4.both public-key & private-key
SSH-2 does not contain ________
1.transport layer
2.user authentication layer
3.physical layer
4.connection layer
The commands, from client to server, and replies, from server to client, are sent across the control connection in ________ bit ASCII format.
1.8
2.7
3.3
4.5
The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is _______
1.Stream mode
2.Block mode
3. Compressed mode
4.message mode
The DHCP server _______
1.maintains a database of available IP addresses
2.maintains the information about client configuration parameters
3. grants a IP address when receives a request from a client
4.all of the mentioned
The entire hostname has a maximum of ________
1.255 characters
2. 127 characters
3. 63 characters
4.31 characters
The password is sent to the server using ________ command.
1.PASSWD
2.PASS
3.PASSWORD
4.PWORD
Typically the TCP port used by SMTP is _____
1.25
2.35
3.50
4.15
User agent does not support this ______
1.Composing messages
2.Reading messages
3.Replying messages
4.Routing messages
What is on-demand mail relay (ODMR)?
1. protocol for SMTP security
2.an SMTP extension
3. protocol for web pages
4.protocol for faster mail transfer
When the sender and the receiver of an email are on different systems, we need only _____
1. One MTA
2.Two UAs
3.Two UAs and one MTA
4.Two UAs and two MTAs
Which of the following is an example of user agents for e-mail?
1.Microsoft Outlook
2.Facebook
3.Google
4.Tumblr
Which one of the following allows client to update their DNS entry as their IP address change?
1.dynamic DNS
2.mail transfer agent
3. authoritative name server
4. None of the mentioned
Which one of the following authentication method is used by SSH?
1. public-key
2. host based
3.password
4.all of the mentioned
Which one of the following feature was present in SSH protocol, version 1?
1.password changing
2.periodic replacement of session keys
3.support for public-key certificates
4.none of the mentioned
Which one of the following is a file transfer protocol using SSH?
1. SCP
2.SFTP
3.Rsync
4.all of the mentioned
Which one of the following is an SMTP server configured in such a way that anyone on the internet can send e-mail through it?
1. open mail relay
2. wide mail reception
3. open mail reception
4. short mail reception
Which one of the following is not true?
1. multiple hostnames may correspond to a single IP address
2.a single hostname may correspond to many IP addresses
3. a single hostname may correspond to a single IP address
4.none of the mentioned
Which one of the following protocol can be used for login to a shell on a remote host except SSH?
1. telnet
2. rlogin
3.both telnet and rlogin
4.none of the mentioned
Which one of the following protocol is used to receive mail messages?
1. SMTP
2.Post Office Protocol (POP)
3. Internet Message Access Protocol (IMAP)
4. FTP
Which standard TCP port is assigned for contacting SSH servers?
1. port 21
2. port 22
3.port 23
4. port 24
Wildcard domain names start with label _______
1.@
2.*
3. &
4.#